Using Anti-OSINT to Create a Positive Image of Internet Users to Prevent Criminal Acts
DOI:
https://doi.org/10.15290/eejtr.2025.09.02.02Keywords:
information from open sources, cyberspace, privacy, data analysisAbstract
The role of using anti-OSINT to promote a positive image of Internet users and fight cybercrime is becoming increasingly important in the era of digital transformation. Therefore, the purpose of this study was to analyse the specific features of using OSINT as a legal means of obtaining and using Internet user data. To fulfil this purpose, various methods were employed, namely: dialectical, comparative legal, systematisation, descriptive, and systemic analysis. The analysis found that OSINT can be quite vulnerable to disinformation, as electronic identifiers can be easily modified, which increases the risk of falsifying the personal data found. It was found that there are methods of obtaining data, such as information about the operating system, fonts, screen settings, and plug-ins, which allow for more reliable user identification. This is becoming key to improving the effectiveness of intrusion detection systems and identifying potential intruders in the network. The study emphasised the need to take steps to change the culture, including reducing the attractiveness of abuse among users. This makes such negative behaviour less attractive and less supportive. One possible measure that can be taken is to limit the ability to create multiple accounts for a single user, which can help prevent “long-term” negative effects. To ensure the ethical use of OSINT and prevent negative consequences, it is vital to develop and follow clear rules that follow privacy and data protection laws. This will help create a prominent level of trust and security in the online environment.
Downloads
References
Bangsawan, M. I., Santoso, B., Diarti, D. K., Mahendra, S., & Kubota, E. (2020). Personal data protection policy during Covid-19 pandemic. Law and Justice, 1, 21-31. https://doi.org/10.23917/laj.v8i1.1558.
Block, L. (2023). The long history of OSINT. Journal of Intelligence History, 1, 1-15. https://doi.org/10.1080/16161262.2023.2224091.
Ciekanowski, Z., Gruchelski, M., Nowicka, J., Żurawski, S., & Pauliuchuk, Y. (2023). Cyberspace as a source of new threats to the security of the European Union. European Research Studies Journal, 26(3), 782-797. https://doi.org/10.35808/ersj/3249.
Congressional Research Service. (2007, December 5). Open source intelligence (OSINT): Issues for Congress [Report]. University of North Texas Libraries, UNT Digital Library. https://digital.library.unt.edu/ark:/67531/metadc819267/m1/20.
David, A., Jeganathan, G. S., & Azam, S. (2023). Internet users’ top concerns ensuring data privacy, security and protection. ICMRME-2023 Proceedings, 1, 1–17. https://www.researchgate.net/publication/372498509_Internet_Users_Top_Concerns_Ensuring_Data_Privacy_Security_and_Protection.
European Commission. (2020). White paper on artificial intelligence: A European approach to excellence and trust. https://ec.europa.eu/info/sites/info/files/commission-white-paper-artificial-intelligence-feb2020_en.pdf.
European Commission. (2020, February 19). White paper on artificial intelligence: A European approach to excellence and trust. https://ec.europa.eu/info/sites/info/files/commission-white-paper-artificial-intelligence-feb2020_en.pdf.
European Parliament and Council of the European Union. (2016a, April 27). Directive (EU) 2016/680 of the European Parliament and of the Council on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision 2008/977/JHA. Official Journal of the European Union, L 119, 89-131. https://eur-lex.europa.eu/eli/dir/2016/680/oj.
European Parliament and Council of the European Union. (2016b, April 27). Regulation (EU) 2016/679 of the European Parliament and of the Council on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). Official Journal of the European Union, L 119, 1-88. https://eur-lex.europa.eu/eli/reg/2016/679/oj.
Frankivsk District Court of Lviv. (2023). Rishennia Frankivskoho raionnoho sudu m. Lvova No. 465/1964/23 [Decision of the Frankivsk District Court of Lviv No. 465/1964/23]. https://reyestr.court.gov.ua/Review/111542290.
GDPR (2018, May). General Data Protection Regulation (GDPR). https://gdpr-info.eu/.
Goryca, T. (2023). The use of open sources of information in the activities of the formations responsible for protection of the executive bodies of the state. https://wsb.edu.pl/files/pages/634/security_forum_1_2023_doi_10_26410_sf_1_23_6.pdf.
Hadi, H., Harris, S., & Cao, Y. (2023). Cybersecurity as a service for Internet of Everything (IoE). https://doi.org/10.13140/RG.2.2.28225.94563.
Intelligence studies: Types of intelligence collection. (n.d.). https://usnwc.libguides.com/c.php?g=494120&p=3381426.
Islamic State supporters hijack dormant Twitter accounts. (n.d.). https://dig.watch/updates/islamic-state-supporters-hijack-dormant-twitter-accounts.
Jacobs, A., & Kloo, I. (2023). Detecting global events with Bayesian changepoint detection on flight data. https://www.ieworldconference.org/content/WP2023/Papers/GDRKMCC23_53.pdf.
Kamal, M. (2023). Legal implications of AI-driven OSINT: Insider threats and data leaks in Egypt and the European Union. https://doi.org/10.13140/RG.2.2.22359.65446.
Kędzierska, G. (2022). Intelligence gathering in forensic science. https://cris.mruni.eu/server/api/core/bitstreams/5f7805f9-e06b-49cc-a8ef-9c65740fe87d/content.
Khadim, S. W., Hassen, O. A., & Ibrahim, H. (2023). A review on the mechanism mitigating and eliminating internet crimes using modern technologies. Wasit Journal of Computer and Mathematics Science, 3, 50-68. https://doi.org/10.31185/wjcm.48.
Konieczny, M. (2025). Anti-OSINT methods ensuring protection of personal data in the context of cybercrime. RAIP, 1(25), 127-144. https://doi.org/10.5604/01.3001.0055.1100.
Konieczny, M.K. (2023). Cyberprzestępczość - krótka historia, współczesne oblicza i trudna do przewidzenia przyszłość. RAIP, 1(23), 29-50. https://doi.org/10.5604/01.3001.0016.3776.
Lakomy, M. (2023). Open-source intelligence and research on online terrorist communication: Identifying ethical and security dilemmas. Media, War & Conflict, 1-18. https://doi.org/10.1177/17506352231166322.
Larsen, O., Ngo, H., & Le-Khac, N. (2023). A quantitative study of the law enforcement in using open source intelligence techniques through undergraduate practical training. Forensic Science International: Digital Investigation, 47, 1-11. https://doi.org/10.1016/j.fsidi.2023.301622.
Lewulis, P. (2022). Collecting digital evidence from online sources: Deficiencies in current Polish criminal law. Criminal Law Forum, 33, 39-62. https://doi.org/10.1007/s10609-021-09430-4.
Narasimhan, P. K., Bhosale, C., Hasban, M. P., Naqvi, N. Z., Ecevit, M. I., Schwarz, K., & Creutzburg, R. (2023). Open-source intelligence (OSINT) investigation in Facebook. https://doi.org/10.2352/EI.2023.35.3.MOBMU-357.
Obaidat, M. J., Al-Syouf, I. A., Awawdeh, Y. F., Masa'deh, A. E., & Al-Haija, Q. A. (2025, July). Darknet Threats and Detection Strategies: A Concise Overview. In 2025 16th International Conference on Information and Communication Systems (ICICS) (pp. 1-6). IEEE. https://doi.org/10.1109/ICICS65354.2025.11073091.
OSINT Telegraph. (n.d.). Open source intelligence (OSINT): A comprehensive guide. https://osinttelegraph.com/open-source-intelligence-osint-a-comprehensive-guide/.
OSINT toolkit. (n.d.). https://i-intelligence.eu/resources/osint-toolkit.
Papayamma, K., Varanasi, A., & Marrapu, A. K. (2023). Internet of Things integration and the significance of block chain security. Innovations, 74, 789-798.
Putter, D., & Henrico, S. (2022). Social media intelligence: The national security-privacy nexus. South African Journal of Military Studies, 1, 19-44. https://doi.org/10.5787/50-1-1345.
Raharjo, A. (2023). Prevention of cybercrime through the development of criminal responsibility principles for internet users. Jurnal Dinamika Hukum, 3, 1-13. https://www.researchgate.net/publication/372168145_Prevention_of_Cybercrime_through_the_Development_of_Criminal_Responsibility_Principles_for_Internet_Users.
Riebe, T., Biselli, T., Reuter, C., & Kaufold, M.-A. (2023). Privacy concerns and acceptance factors of OSINT for cybersecurity: A representative survey. Proceedings on Privacy Enhancing Technologies, 1, 1-17. https://petsymposium.org/popets/2023/popets-2023-0028.pdf.
Stratton Oakmont, Inc. v. Prodigy Services Co. (1995). Retrieved 30 April, 2024, from https://en.wikipedia.org/wiki/Stratton_Oakmont,_Inc._v._Prodigy_Services_Co.
Usman, B., Mojaye, E. M., & Msughter, A. E. (2023). Online surveillance and data privacy of internet users: A discourse. Journal of Communication and Media Research, 15, 118-128.
Wolski, J. (2022). “Open-source intelligence” (OSINT): The development, types, capabilities, and limitations of the Method of Obtaining and Analysing Information Extracted from Open Sources (pp. 78-81). https://cba.gov.pl/download/1/7358/CBAMaterialypokonferencyjneLEAF2022Analizakryminalnawprzyszlosci.pdf.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
1. The Author declares that he or she has created the written work and holds exclusive and unlimited copyright /both moral and property rights/ and guarantees that no third parties have rights to the work.
2. In the view of the Copyright and Related Rights Act, a work must fulfill the following criterion:
a) be a manifestation of creative work,
b) have an individual character („author’s personal stamp”),
c) have a set form.
3. The Author declares that the text has not been previously published (under the same or different title, or as a part of another publication).
4. The Author allows (grants a non-exclusive license) the publishing house of University of Białystok to use the scholarly text to:
- preserve and multiply by means of any technique; save in a digital form with no limitations as to the manner and form of digital preservation;
- upload online with no limitations as to the place and time of access.
5. The Author grants consent for editorial changes made in the work.
6. The Author grants the University of Białystok rights free of charge for the duration of property copyright with no territory limits. The University has the right to grant sublicenses in the acquired rights.
7. Granting a non-exclusive license allows the Author to preserve their rights and allows other parties to make use of the work according to sublicensing agreement with provisions identical as those of Attribution 4.0 Internacional License (CC BY 4.0), available online at: https://creativecommons.org/licenses/by/4.0/.
8. The Agreement has been concluded for an indefinite period of time.
9. Because of costs born in preparation of the work for publishing, the Parties oblige themselves to act in good faith and refrain from declining to grant licenses.
10. To all matters not settled herein, provisions of the Civil Code and Copyright and Related Rights Act of 1994, February 4 shall apply.
11. All disputes shall be resolved by a court of local jurisdiction for the place of seat of University of Białystok.